List three different sources of water to a computing system, and state a control for each
What will be an ideal response?
Note:
This
question
is
poorly
phrased.
It
means
three
types
of
water
threats,
that
is,
sources
of
water
that
could
be
threats.
(a)
Rain/roof
collapse,
(b)
break
of
a
water
pipe,
(c)
flood
(rising
from
below).
You might also like to view...
Internet Information Services (IIS) __________.
a. implements a professional-quality Web server b. contains minimal security and configuration features c. requires little expertise to set up and maintain d. all of the above
Which of the following is defined by NIST as “the result of actions taken to ensure that media cannot be reused as originally intended and that information is virtually impossible to recover or prohibitively expensive.”
A) Data destruction B) Degaussing C) Disk wiping D) Chain of custody
Create a movie with a filled rectangle moving diagonally from the top right of the picture to the bottom left.
What will be an ideal response?
________ refer to information about a file, such as the author, the date the file was last changed, and any tags
Fill in the blank(s) with correct word